2018
DOI: 10.1016/j.cose.2017.08.015
|View full text |Cite
|
Sign up to set email alerts
|

Light-weight and secure aggregation protocols based on Bloom filters✰

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…existing contributions. [12], [13], [16] ∈ B1; [17] ∈ B2; [15], [18] ∈ B3; [14] ∈ B4; [19] ∈ A1; [20], [21] ∈ A2; [22] ∈ A3; [23] ∈ A4; [24], [25] ∈ A5; [10], [6], [7], [26] ∈ A7.…”
Section: B3 B2mentioning
confidence: 99%
See 2 more Smart Citations
“…existing contributions. [12], [13], [16] ∈ B1; [17] ∈ B2; [15], [18] ∈ B3; [14] ∈ B4; [19] ∈ A1; [20], [21] ∈ A2; [22] ∈ A3; [23] ∈ A4; [24], [25] ∈ A5; [10], [6], [7], [26] ∈ A7.…”
Section: B3 B2mentioning
confidence: 99%
“…Furthermore, Sultana et al [22] have also addressed a similar problem with the additional capability of detecting packet forgery attacks. Recently, Klonowski et al have also proposed a light-weight data protocol based on Bloom filters [24] and have analyzed the leakage of information to an adversary that has partial knowledge of the Bloom filter. Although the methods in [21], [22], [24] are effective on static topologies, it is observed that these methods are not applicable in the context of vehicular networks wherein the topology may vary and is unknown at the destination.…”
Section: Related Work On Network Provenance Using Bloom Filtersmentioning
confidence: 99%
See 1 more Smart Citation